Calcium carbonate is predominantly present in aqueous systems, which is
commonly used in industrial processes. It has inverse solubility characteristics
resulting in the deposition of scale on heat transfer surface. This paper focuses on
developing methods for inhibition of calcium carbonate scale formation in cooling
tower and air cooler system where scaling can cause serious problems, ZnCl 2 and ZnI
2 has been investigated as scale inhibitor on AISI 316 and 304. ZnCl 2 were more
effective than ZnI 2 in both systems, and AISI 316 show more receptivity to the
chlorides salt compared to AISI 304. The inhibitors were more effective in cooling
tower than air cooler system. AISI 316 show more constant inhibition efficiency in
cooling tower with maximum of 95% with ZnCl 2 and 83% with ZnI 2 .
An isolate of Leishmania major was grown on the semisolid medium and incubated at 26ºC. The isolate was irradiated by He: Ne laser (632.8 nm, 10 mW) at exposure times (5, 10, 15, 20, 25, 30) minutes in their respective order. The unirradiated groups represent control group. Growth rate and percentage of viability were examined during six days after irradiation. The change in these two parameters reflects the effect of irradiation on the parasite. The results refers that the general growth effected by irradiation in comparison with un irradiation group, The growth rate of parasite decrease with increasing the exposure time in comparison with control group. Parasite viability decrease with irradiation and the percentage of living cell dec
... Show MoreThis study has been conducted to examin the effect of potassium sorbate at different level of 0.03,0.06,0.10% on the number of bacteria and mold and to extend the storage life of laboratory processed biscuit. The results indicated that the use of 0.03% potassium sorbate prolonged the storage peroid until the third month .three types of bacteria has been isolated from processed biscuit, namely, Staphylococcus aureus, Bacillus cereus, Esherichia coli using 0.06% potassium sorbate showed no growth of bacteria up to six month of storage ,while using of 0.03% and 0.06% potassium sorbate prevent the growth of mold up to three and six months of storage respectively. Both Aspergillus and Penicillium were isolated from the processed biscuit.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract: Recombinant human bone morphogenetic protein-2 (rhBMP-2) and platelet-rich fibrin (PRF) bioactive materials have been used to enhance healing and improve dental implant stability. This study aimed to compare the effect of rhBMP-2 and PRF bioactive materials on dental implant stability at different intervals and to evaluate the correlation of implant length and diameter with implant stability. Two bioactive materials were compared to evaluate their effect on dental implant stability. A total of 32 patients (102 dental implants) were divided into 3 groups: 24 dental implants with bone morphogenetic protein (BMP), 27 dental implants with PRF, and 51 dental implants without BMP or PRF (control group). Data were statistically analyzed
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAcid treatment is a widely used stimulation technique in the petroleum industry. Matrix acidizing is regarded as an effective and efficient acidizing technique for carbonate formations that leads to increase the fracture propagation, repair formation damage, and increase the permeability of carbonate rocks. Generally, the injected acid dissolves into the rock minerals and generates wormholes that modify the rock structure and enhance hydrocarbon production. However, one of the key issues is the associated degradation in the mechanical properties of carbonate rocks caused by the generated wormholes, which may significantly reduce the elastic properties and hardness of rocks. There have been several experimental and simulation studies regardi
... Show MoreThis research is an attempt to study aspects of syntactic deviation in AbdulWahhab Al-Bayyati with reference to English. It reviews this phenomenon from an extra-linguistic viewpoint. It adopts a functional approach depending on the stipulates of systemic Functional Grammar as developed by M.A.K. Halliday and others adopting this approach. Within related perspective, fairly’s taxonomy (1975) has been chosen to analyze the types of syntactic deviation because it has been found suitable and relevant to describe this phenomenon. The research hypothesizes that syntactic deviation is pervasive in Arabic poetry, in general and in Abdul-Wahhab Al-Bayyati Poetry in specific, and can be analyzed in the light of systemic Functional Grammar
... Show More